Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10.5; and Kata Containers 1.9 and earlier versions.
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Link | Tags |
---|---|
https://github.com/kata-containers/runtime/pull/2487 | third party advisory patch |
https://github.com/kata-containers/runtime/pull/2477 | third party advisory patch |
https://github.com/kata-containers/runtime/issues/2488 | third party advisory patch |
https://github.com/kata-containers/agent/issues/791 | third party advisory |
https://github.com/kata-containers/agent/pull/792 | patch |
https://github.com/kata-containers/runtime/releases/tag/1.11.1 | third party advisory release notes |
https://github.com/kata-containers/runtime/releases/tag/1.10.5 | third party advisory release notes |